Online Profile

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 47262 Experts worldwide ranked by ideXlab platform

Feng Qian - One of the best experts on this subject based on the ideXlab platform.

  • design implementation and evaluation of adaptive recompilation with on stack replacement
    Symposium on Code Generation and Optimization, 2003
    Co-Authors: Stephen J Fink, Feng Qian
    Abstract:

    Modern virtual machines often maintain multiple compiled versions of a method. An on-stack replacement (OSR) mechanism enables a virtual machine to transfer execution between compiled versions, even while a method runs. Relying on this mechanism, the system can exploit powerful techniques to reduce compile time and code space, dynamically de-optimize code, and invalidate speculative optimizations.This paper presents a new, simple, mostly compiler-independent mechanism to transfer execution into compiled code. Additionally, we present enhancements to an analytic model for recompilation to exploit OSR for more aggressive optimization. We have implemented these techniques in Jikes RVM and present a comprehensive evaluation, including a study of fully automatic, Online, Profile-driven deferred compilation.

  • design implementation and evaluation of adaptive recompilation with on stack replacement
    Symposium on Code Generation and Optimization, 2003
    Co-Authors: Stephen J Fink, Feng Qian
    Abstract:

    Modern virtual machines often maintain multiple compiled versions of a method. An on-stack replacement (OSR) mechanism enables a virtual machine to transfer execution between compiled versions, even while a method runs. Relying on this mechanism, the system can exploit powerful techniques to reduce compile time and code space, dynamically de-optimize code, and invalidate speculative optimizations. The paper presents a new, simple, mostly compiler-independent mechanism to transfer execution into compiled code. Additionally, we present enhancements to an analytic model for recompilation to exploit OSR for more aggressive optimization. We have implemented these techniques in Jikes RVM and present a comprehensive evaluation, including a study of fully automatic, Online, Profile-driven deferred compilation.

Stephen J Fink - One of the best experts on this subject based on the ideXlab platform.

  • design implementation and evaluation of adaptive recompilation with on stack replacement
    Symposium on Code Generation and Optimization, 2003
    Co-Authors: Stephen J Fink, Feng Qian
    Abstract:

    Modern virtual machines often maintain multiple compiled versions of a method. An on-stack replacement (OSR) mechanism enables a virtual machine to transfer execution between compiled versions, even while a method runs. Relying on this mechanism, the system can exploit powerful techniques to reduce compile time and code space, dynamically de-optimize code, and invalidate speculative optimizations.This paper presents a new, simple, mostly compiler-independent mechanism to transfer execution into compiled code. Additionally, we present enhancements to an analytic model for recompilation to exploit OSR for more aggressive optimization. We have implemented these techniques in Jikes RVM and present a comprehensive evaluation, including a study of fully automatic, Online, Profile-driven deferred compilation.

  • design implementation and evaluation of adaptive recompilation with on stack replacement
    Symposium on Code Generation and Optimization, 2003
    Co-Authors: Stephen J Fink, Feng Qian
    Abstract:

    Modern virtual machines often maintain multiple compiled versions of a method. An on-stack replacement (OSR) mechanism enables a virtual machine to transfer execution between compiled versions, even while a method runs. Relying on this mechanism, the system can exploit powerful techniques to reduce compile time and code space, dynamically de-optimize code, and invalidate speculative optimizations. The paper presents a new, simple, mostly compiler-independent mechanism to transfer execution into compiled code. Additionally, we present enhancements to an analytic model for recompilation to exploit OSR for more aggressive optimization. We have implemented these techniques in Jikes RVM and present a comprehensive evaluation, including a study of fully automatic, Online, Profile-driven deferred compilation.

Ponnurangam Kumaraguru - One of the best experts on this subject based on the ideXlab platform.

  • what they do in shadows twitter underground follower market
    Conference on Privacy Security and Trust, 2015
    Co-Authors: Anupama Aggarwal, Ponnurangam Kumaraguru
    Abstract:

    Internet users and businesses are increasingly using Online social networks (OSN) to drive audience traffic and increase their popularity. In order to boost social presence, OSN users need to increase the visibility and reach of their Online Profile, like — Facebook likes, Twitter followers, Instagram comments and Yelp reviews. For example, an increase in Twitter followers not only improves the audience reach of the user but also boosts the perceived social reputation and popularity. This has led to a scope for an underground market that provides followers, likes, comments, etc. via a network of fraudulent and compromised accounts and various collusion techniques. In this paper, we landscape the underground markets that provide Twitter followers by studying their basic building blocks — merchants, customers and phony followers. We charecterize the services provided by merchants to understand their operational structure and market hierarchy. Twitter underground markets can operationalize using a premium monetary scheme or other incentivized freemium schemes. We find out that freemium market has an oligopoly structure with few merchants being the market leaders. We also show that merchant popularity does not have any correlation with the quality of service provided by the merchant to its customers. Our findings also shed light on the characteristics and quality of market customers and the phony followers provided by underground market. We draw comparison between legitimate users and phony followers, and find out key identifiers to separate such users. With the help of these differentiating features, we build a supervised learning model to predict suspicious following behaviour with an accuracy of 89.2%.

  • what they do in shadows twitter underground follower market
    arXiv: Social and Information Networks, 2014
    Co-Authors: Anupama Aggarwal, Ponnurangam Kumaraguru
    Abstract:

    Internet users and businesses are increasingly using Online social networks (OSN) to drive audience traffic and increase their popularity. In order to boost social presence, OSN users need to increase the visibility and reach of their Online Profile, like - Facebook likes, Twitter followers, Instagram comments and Yelp reviews. For example, an increase in Twitter followers not only improves the audience reach of the user but also boosts the perceived social reputation and popularity. This has led to a scope for an underground market that provides followers, likes, comments, etc. via a network of fraudulent and compromised accounts and various collusion techniques. In this paper, we landscape the underground markets that provide Twitter followers by studying their basic building blocks - merchants, customers and phony followers. We charecterize the services provided by merchants to understand their operational structure and market hierarchy. Twitter underground markets can operationalize using a premium monetary scheme or other incentivized freemium schemes. We find out that freemium market has an oligopoly structure with few merchants being the market leaders. We also show that merchant popularity does not have any correlation with the quality of service provided by the merchant to its customers. Our findings also shed light on the characteristics and quality of market customers and the phony followers provided. We draw comparison between legitimate users and phony followers, and find out key identifiers to separate such users. With the help of these differentiating features, we build a supervised learning model to predict suspicious following behaviour with an accuracy of 89.2%.

C Wijburg - One of the best experts on this subject based on the ideXlab platform.

  • european association of urology uroweb recommendations on the appropriate use of social media
    European Urology, 2014
    Co-Authors: Morgan Roupret, Todd M Morgan, Peter J Bostrom, Matthew R Cooperberg, Alexander Kutikov, Kate Linton, Joan Palou, L Martinezpineiro, Henk G Van Der Poel, C Wijburg
    Abstract:

    Abstract Social media use is becoming common in medical practice. Although primarily used in this context to connect physicians, social media allows users share information, to create an Online Profile, to learn and keep knowledge up to date, to facilitate virtual attendance at medical conferences, and to measure impact within a field. However, shared content should be considered permanent and beyond the control of its author, and typical boundaries, such as the patient–physician interaction, become blurred, putting both parties at risk. The European Association of Urology brought together a committee of stakeholders to create guidance on the good practice and standards of use of social media. These encompass guidance about defining an Online Profile; managing accounts; protecting the reputations of yourself and your organization; protecting patient confidentiality; and creating honest, responsible content that reflects your standing as a physician and your membership within this profession.

Karen L Fingerman - One of the best experts on this subject based on the ideXlab platform.

  • digital dating Online Profile content of older and younger adults
    Journals of Gerontology Series B-psychological Sciences and Social Sciences, 2016
    Co-Authors: Eden M Davis, Karen L Fingerman
    Abstract:

    Objectives Older adults are utilizing Online dating websites in increasing numbers. Adults of different ages may share motivations for companionship and affection, but dating Profiles may reveal differences in adults' goals. Theories addressing age-related changes in motivation suggest that younger adults are likely to emphasize themselves, achievements, attractiveness, and sexuality. Older adults are likely to present themselves positively and emphasize their existing relationships and health. Method We collected 4,000 dating Profiles from two popular websites to examine age differences in self-presentations. We used stratified sampling to obtain a sample equally divided by gender, aged 18-95 years. We identified 12 themes in the Profiles using Linguistic Inquiry and Word Count software (Pennebaker, Booth, & Francis, 2007). Results Regression analyses revealed that older adults were more likely to use first-person plural pronouns (e.g., we, our) and words associated with health and positive emotions. Younger adults were more likely to use first-person singular pronouns (e.g., I, my) and words associated with work and achievement. Discussion Findings suggest that younger adults enhance the "self" when seeking romantic partnership. In contrast, older adults are more positive in their Profiles and focus more on connectedness and relationships to others.